{"title":"基于多代理的信息流安全体系结构","authors":"Hui Wang, Zongpu Jia, B. Lu, Zihao Shen","doi":"10.1109/ICIME.2010.5478021","DOIUrl":null,"url":null,"abstract":"Documents are often considered as the most important information assets so that they will be the chief target of insider misuse. How to protect confidential documents from being stolen or abused is a vital problem that is concerned with the survival and honor of an organization. However, existing tools or technologies are basically invalid to completely resolve it. In this paper, the security architecture for document is presented, and specific workflow of multi-agents and related implementation algorithms are given.","PeriodicalId":382705,"journal":{"name":"2010 2nd IEEE International Conference on Information Management and Engineering","volume":"12 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Information flow security architecture based on multi-agents\",\"authors\":\"Hui Wang, Zongpu Jia, B. Lu, Zihao Shen\",\"doi\":\"10.1109/ICIME.2010.5478021\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Documents are often considered as the most important information assets so that they will be the chief target of insider misuse. How to protect confidential documents from being stolen or abused is a vital problem that is concerned with the survival and honor of an organization. However, existing tools or technologies are basically invalid to completely resolve it. In this paper, the security architecture for document is presented, and specific workflow of multi-agents and related implementation algorithms are given.\",\"PeriodicalId\":382705,\"journal\":{\"name\":\"2010 2nd IEEE International Conference on Information Management and Engineering\",\"volume\":\"12 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-04-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 2nd IEEE International Conference on Information Management and Engineering\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICIME.2010.5478021\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 2nd IEEE International Conference on Information Management and Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIME.2010.5478021","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Information flow security architecture based on multi-agents
Documents are often considered as the most important information assets so that they will be the chief target of insider misuse. How to protect confidential documents from being stolen or abused is a vital problem that is concerned with the survival and honor of an organization. However, existing tools or technologies are basically invalid to completely resolve it. In this paper, the security architecture for document is presented, and specific workflow of multi-agents and related implementation algorithms are given.